E-Guide: How to tie SIM to identity management for security effectiveness
sponsored by TechTarget Security
EGUIDE:
Security information management systems and identity and access management systems were originally created to work independently, but combining these two disparate technologies presents greater security effectiveness and control.
Posted: 24 Mar 2011 | Published: 24 Mar 2011
|
|
|
Case Study: Providence College Captures Previously Undetected Attacks with FireEye Web Malware Protection System
sponsored by FireEye
CASE STUDY:
This case study will show how Providence College was able to keep there network secure from advanced malware attacks, and how this security solution could do the same for you.
Posted: 10 May 2011 | Published: 10 May 2011
|
|
|
Evolution of Integrity Checking with Intel® Trusted Execution Technology: an Intel IT Perspective
sponsored by Intel
WHITE PAPER:
As part of an effort to address security concerns, Intel IT evaluated Intel® Trusted Execution Technology (Intel® TXT), a new security technology in Intel® processors. Intel TXT is a foundation technology that can be applied to enhance security in multiple usage models. Read this white paper to learn more.
Posted: 02 May 2011 | Published: 25 Mar 2011
|
|
|
Data Privacy e-Book
sponsored by TechTarget ComputerWeekly.com
TECHNICAL ARTICLE:
SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.
Posted: 12 Apr 2011 | Published: 12 Apr 2011
|
|
|
April Issue of Information Security Magazine: Cloud Migration: Look before you leap
sponsored by Information Security Magazine
EZINE:
This month’s Information Security Magazine Online cover story explores the need for careful planning when migrating to the cloud. The benefits of cloud computing are real; a lower IT profile, faster provisioning, and the global availability of new services hold incredible value for most organizations.
Posted: 05 Apr 2011 | Published: 05 Apr 2011
|
|
|
Rethinking Information Security to Improve Business Agility
sponsored by Intel
WHITE PAPER:
To enable rapid adoption on new technology and usage models—and provide protection in an evolving threat landscape—Intel IT has embarked on a radical five-year redesign of Intel's information security architecture. Continue reading to learn more.
Posted: 28 Mar 2011 | Published: 28 Mar 2011
|
|
|
Handle with Care: Calculating and managing risk is tricky business
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this inaugural issue of Information Security Europe, our cover story dives-deep into the difficult task of calculating and managing risk in the ever-changing European threat landscape.
Posted: 25 Mar 2011 | Published: 25 Mar 2011
|
|
|
Cloud Computing: Business Benefits With Security, Governance and Assurance Perspectives
sponsored by ISACA
WHITE PAPER:
Globalization and recent economic pressures have resulted in increased requirements for the availability, scalability and efficiency of enterprise information technology (IT) solutions.
Posted: 23 Mar 2011 | Published: 23 Mar 2011
|
|
|
Register Free to Visit Infosecurity Europe - 19th - 21st April 2011
sponsored by Infosecurity Europe
EVENT:
Europe's No. 1 Information Security event, with an unrivalled free education programme, exhibitors showcasing new and emerging technologies and offering practical and professional expertise.
Posted: 09 Feb 2011 | Published: 08 Feb 2011
|
All resources sponsored by Infosecurity Europe
|
|
Data Protection 2.0: It’s Not Just Names and Numbers Anymore
sponsored by Tripwire, Inc.
WHITE PAPER:
The external forces of advanced threats and compliance obligations, combined with the internal forces of new business initiatives, lead to a complex set of data protection requirements. This paper provides an overview of the many data protection challenges CISOs face and suggests a sequence of five actions to take to address these challenges.
Posted: 08 Feb 2011 | Published: 08 Feb 2011
|
|
|
February Issue of Information Security magazine: “Safety Check: Enforcing endpoint security requires careful planning and deployment”
sponsored by Information Security Magazine
EGUIDE:
This month’s Information Security Magazine Online cover story explores the current state of endpoint security enforcement and the challenges enterprises face during implementation.
Posted: 02 Feb 2011 | Published: 31 Jan 2011
|
|
|
FISMA Compliance: A Holistic Approach to FISMA and Information Security
sponsored by IBM
WHITE PAPER:
IBM can help your federal agency implement a holistic strategy that improves overall security posture and readiness. Read this white paper to learn about the IBM Internet Security Systems (ISS) strategic approach to cybersecurity and gain a clearer understanding of the latest FISMA legislation and compliance mandates.
Posted: 10 Jan 2011 | Published: 10 Jan 2011
|
|
|
Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
sponsored by Information Security Magazine
EZINE:
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
Posted: 09 Dec 2010 | Published: 09 Dec 2010
|
|
|
Presentation Transcript: Understanding Risk: An Opportunity for IT Managers
sponsored by IBM
PRESENTATION TRANSCRIPT:
This presentation transcript of the webcast “Understanding Risk: An Opportunity for IT Managers” outlines the results of an IBM Global Risk Study that was commissioned to understand how IT managers are working to understand and mitigate risk.
Posted: 01 Dec 2010 | Published: 01 Dec 2010
|
|
|
November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management
sponsored by Information Security Magazine
EZINE:
November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more!
Posted: 10 Nov 2010 | Published: 10 Nov 2010
|
|
|
E-Guide A Decision Maker’s Guide to Log Management
sponsored by ArcSight, an HP Company
EGUIDE:
While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2010 | Published: 27 Oct 2010
|
|
|
Essential Guide to SIMs Strategy
sponsored by Information Security Magazine
EGUIDE:
Take an incremental approach to security information and event management. Start slow, narrow your goals and be patient with these expensive and complex tools, otherwise data overload will bring you down. Read this guide to find out so much more.
Posted: 26 Oct 2010 | Published: 26 Oct 2010
|
|
|
Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER:
This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010
|
|
|
IT@Intel Brief: Enterprise Security Benefits of Microsoft Windows 7
sponsored by Intel
IT BRIEFING:
Read this solution brief to learn how Microsoft Windows 7 provides enterprise information security and protects against malware and phishing. This paper discusses all the key features.
Posted: 27 Sep 2010 | Published: 25 Jul 2010
|
|
|
Your September Issue of Information Security Magazine– Readers’ Choice Awards
sponsored by Information Security Magazine
EGUIDE:
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
Posted: 10 Sep 2010 | Published: 10 Sep 2010
|
|
|
Anatomy of a Data Breach - Why Breaches Happen and What to Do About It
sponsored by Symantec Corporation
WHITE PAPER:
This paper examines the three most common sources of data breaches, and offers a broad perspective on what can be done to stop data breaches, as well as specific recommendations to take preventive action.
Posted: 23 Aug 2010 | Published: 18 Aug 2010
|
|
|
Identity Finder Enterprise Suite 4.5
sponsored by Identity Finder, LLC
TRIAL SOFTWARE:
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability.
Posted: 26 Jul 2010 | Premiered: 26 Jul 2010
|
|
|
Data Protection Solutions at Midsize Organizations
sponsored by Trend Micro, Inc.
WHITE PAPER:
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.
Posted: 15 Jul 2010 | Published: 01 Feb 2008
|
|
|
Improving Clinician Workflows with One-Touch Desktop Roaming
sponsored by Imprivata
WHITE PAPER:
The move from paper-based medical records systems to EMR is rightly viewed as a step toward improved patient care, increased clinician productivity, and lower costs. But striking a balance between access for clinicians and privacy for patients can be a difficult task. This paper presents a one-touch desktop roaming solution that benefits both.
Posted: 24 Jun 2010 | Published: 24 May 2010
|
|
|
Information Security Magazine – June 2010: Laptop Lockdown
sponsored by Information Security Magazine
EZINE:
This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue.
Posted: 16 Jun 2010 | Published: 16 Jun 2010
|
|